Recommendations on Certification of EHR Modules HIT Standards Committee Privacy and Security Workgroup April 11, 2014.

Slides:



Advertisements
Similar presentations
NISTs Role in Securing Health Information AMA-IEEE Medical Technology Conference on Individualized Healthcare Kevin Stine, Information Security Specialist.
Advertisements

HIPAA Security Presentation to The American Hospital Association Dianne Faup Office of HIPAA Standards November 5, 2003.
Quality Measures Vendor Tiger Team December 13, 2013.
Quality Measures Vendor Tiger Team January 30, 2014.
HITSC Clinical Quality Workgroup Jim Walker March 27, 2012.
2014 Edition Release 2 EHR Certification Criteria Final Rule.
Information Risk Management Key Component for HIPAA Security Compliance Ann Geyer Tunitas Group
2014 Certification Criteria associated with MU Menu Stage 2: 2014 Certification Criteria associated with MU Core Stage 2: 2014 Certification Criteria associated.
1 HIT Standards Committee Privacy and Security Workgroup: Recommendations Dixie Baker, SAIC Steven Findlay, Consumers Union August 20, 2009.
Certification NPRM Comments Package Transport and Security Standards Workgroup Dixie Baker, Chair Lisa Gallagher, Co-Chair May 20, 2015.
User Authentication Recommendations Transport & Security Standards Workgroup December 10, 2014.
Beyond HIPAA, Protecting Data Key Points from the HIPAA Security Rule.
Temporary Certification Program: Overview Educational Session August 18, 2010 Carol Bean, PhD Director, Certification Division Office of the National Coordinator.
Discussion of 2015 Ed. NPRM Certification/Adoption Workgroup HIT Policy Committee April 2, 2014.
Internal Auditing and Outsourcing
HIT Policy Committee Accountable Care Workgroup – Kickoff Meeting May 17, :00 – 2:00 PM Eastern.
Privacy and Security Tiger Team Comparison of Stage 2 Proposed Rules w/Health IT Policy Committee previous privacy & security recommendations Preliminary.
1 HIT Policy Committee HIT Standards Committee Privacy and Security Workgroup: Status Report Dixie Baker, SAIC July 16, 2009.
Transport & Security Standards Workgroup Notice of Proposed Rulemaking Comments Dixie Baker, Chair Lisa Gallagher, Co-Chair May 15, 2015.
HIT Policy Committee Nationwide Health Information Network Governance Workgroup Recommendations Accepted by the HITPC on 12/13/10 Nationwide Health Information.
Authentication, Access Control, and Authorization (1 of 2) 0 NPRM Request (for 2017) ONC is requesting comment on two-factor authentication in reference.
Privacy & Security Workgroup NPRM Comments Dixie Baker, Chair Lisa Gallagher, Co-Chair April 24, 2014.
Privacy and Security Tiger Team Today’s Discussion: Query/Response Scenarios for Health Information Exchange and MU3 RFC Comments April 30, 2013.
Privacy and Security Tiger Team Today’s Discussion: MU3 RFC Comments May 8, 2013.
Confidentiality and Security Issues in ART & MTCT Clinical Monitoring Systems Meade Morgan and Xen Santas Informatics Team Surveillance and Infrastructure.
2012 Audits of Covered Entity Compliance with HIPAA Privacy, Security and Breach Notification Rules Initial Analysis February 2013.
HIT Standards Committee Privacy and Security Workgroup Recommendations on Certification of EHR Modules Dixie Baker, Chair Walter Suarez, Co-Chair December.
Health Insurance Portability and Accountability Act of 1996 (HIPAA) Proposed Rule: Security and Electronic Signature Standards.
Nationwide Health Information Network: Conditions for Trusted Exchange Request For Information (RFI) Steven Posnack, MHS, MS, CISSP Director, Federal Policy.
HIT Standards Committee Privacy and Security Workgroup: Initial Reactions Dixie Baker, SAIC Steven Findlay, Consumers Union June 23, 2009.
Transport & Security Standards Workgroup Notice of Proposed Rulemaking Comments Dixie Baker, Chair Lisa Gallagher, Co-Chair April 21, 2015.
HIT Policy Committee Information Exchange Workgroup NwHIN Conditions for Trusted Exchange Request For Information (RFI) May 15,
Larry Wolf, chair Marc Probst, co-chair Certification / Adoption Workgroup March 19, 2014.
HIT Policy Committee NHIN Workgroup Recommendations Phase 2 David Lansky, Chair Pacific Business Group on Health Danny Weitzner, Co-Chair Department of.
HIT Policy Committee Privacy & Security Workgroup Update Deven McGraw Center for Democracy & Technology Rachel Block Office of Health Information Technology.
Eliza de Guzman HTM 520 Health Information Exchange.
Discussion of 2015 Ed. NPRM Certification/Adoption Workgroup HIT Policy Committee April 7, 2014.
FleetBoston Financial HIPAA Privacy Compliance Agnes Bundy Scanlan Managing Director and Chief Privacy Officer FleetBoston Financial.
Working with Health IT Systems Protecting Privacy, Security, and Confidentiality in HIT Systems Lecture b This material (Comp7_Unit7b) was developed by.
Provider Data Migration and Patient Portability NwHIN Power Team August 28, /28/141.
The Culture of Healthcare Privacy, Confidentiality, and Security Lecture d This material (Comp2_Unit9d) was developed by Oregon Health and Science University,
Working with HIT Systems
Health eDecisions Use Case 2: CDS Guidance Service Strawman of Core Concepts Use Case 2 1.
HIT Standards Committee Overview and Progress Report March 17, 2010.
HIPAA Security Final Rule Overview
HIT Standards Committee Privacy and Security Workgroup Standards and Certification Requirements for Certified EHR Modules Dixie Baker, Chair Walter Suarez,
Privacy and Security Tiger Team Potential Questions for Request for Comment Meaningful Use Stage 3 October 3, 2012.
HIT Policy Committee Meeting Nationwide Health Information Network Governance June 25, 2010 Mary Jo Deering, PhD ONC, Office of Policy and Planning NHIN.
HITPC Meaningful Use Stage 3 RFC Comments July 22, 2013 Information Exchange Workgroup Micky Tripathi.
Larry Wolf Certification & Adoption Workgroup Recommendations on LTPAC/BH EHR Certification May 6, 2014.
Medicaid EHR Incentive Program Updates eHealth Services and Support September 24, 2014 Today’s presenter: Nicole Bennett, Provider Enrollment and Verification.
Final Rule Regarding EHR Certification Flexibility for 2014 Today’s presenters: Al Wroblewski, Client Services Relationship Manager Thomas Bennett, Client.
HIT Standards Committee Privacy and Security Workgroup Task Update: Standards and Certification Criteria for Certifying EHR Modules Dixie Baker, Chair.
Provider Directories Tasking, Review and Mod Spec Presentation NwHIN Power Team April 17, 2014.
Data Gathering HITPC Workplan HITPC Request for Comments HITSC Committee Recommendations gathered by ONC HITSC Workgroup Chairs ONC Meaningful Use Stage.
Meaningful Use Workgroup Subgroup 2 - Engaging Patients and Families Christine Bechtel, Subgroup Chair Paul Tang, MU WG Chair July 2,
HIPAA Compliance Case Study: Establishing and Implementing a Program to Audit HIPAA Compliance Drew Hunt Network Security Analyst Valley Medical Center.
Certification and Adoption Workgroup HIT Policy Committee April 28, 2014 Discussion on Incremental Rulemakings.
Office of the National Coordinator for Health Information Technology ONC Update for HITSP Board U.S. Department of Health and Human Services John W. Loonsk,
360Exchange (360X) Project 12/06/12. Reminders / announcements 360X Update CEHRT 2014 / MU2 Transition of Care Requirements 1 Agenda.
2015 Edition Certification NPRM Non API Group Report Out May 5, 2015 Architecture, Services, and APIs Arien Malec, co-chair David McCallie, co-chair.
The Health Insurance Portability and Accountability Act of 1996 “HIPAA” Public Law
COMMUNITY-WIDE HEALTH INFORMATION EXCHANGE: HIPAA PRIVACY AND SECURITY ISSUES Ninth National HIPAA Summit September 14, 2004 Prepared by: Robert Belfort,
HIT Policy Committee Health Information Exchange Workgroup Comments on Notice of Proposed Rule Making (NPRM) and Interim Final Rule (IFR) Deven McGraw,
Regulatory Roundtable Meaningful Use & HIPAA Kathy Branca Ray Harms.
VERMONT INFORMATION TECHNOLOGY LEADERS
Final HIPAA Security Rule
HIPAA Security Standards Final Rule
THE 13TH NATIONAL HIPAA SUMMIT HEALTH INFORMATION PRIVACY & SECURITY IN SHARED HEALTH RECORD SYSTEMS SEPTEMBER 26, 2006 Paul T. Smith, Esq. Partner,
ONC Update for HITSP Board
Presentation transcript:

Recommendations on Certification of EHR Modules HIT Standards Committee Privacy and Security Workgroup April 11, 2014

EHR Module Certification: 2011 – NPRM 2011 Edition certifies “Complete EHRs” and “EHR Modules,” both of which are required to meet all privacy and security criteria  EHR Module vendors complained that P&S criteria often were not applicable to their products 2014 Edition certifies “Complete EHRs” and “EHR Modules” – EHR Modules are not required to meet any P&S criteria  HITSC/PSWG asserted that providers would have no way of knowing whether any given set of EHR Modules they might choose to use would enable them to meet HIPAA P&S requirements – and suggested an alternative approach NPRM proposes to drop certification of “Complete EHRs” so that all EHR technology submitted for certification will be assessed as either an “EHR Module” (MU or Non-MU) -- requests feedback on approaches for certifying EHR Modules against privacy and security criteria, for consideration for 2017 Edition NPRM

December 2012: Recommendations to HITSC* For 2016 Edition EHR certification, each EHR Module presented for certification should be required to meet each privacy and security criterion using one of the following three paths: 1.Demonstrate, through system documentation and certification testing, that the EHR Module includes functionality that fully conforms to the privacy and security certification criterion. 2.Demonstrate, through system documentation sufficiently detailed to enable integration, that the EHR Module has implemented service interfaces that enable it to access external services necessary to conform to the privacy and security certification criterion. 3.Demonstrate through documentation that the privacy and security certification criterion is inapplicable or would be technically infeasible for the EHR Module to meet. * Recommendation transmitted to ONC on March 23, 2013

December 2012: Recommendation for Minimal Set Based on the 2014 Edition of EHR Certification Criteria, we recommend the following as the “minimal set” of security functionality that every EHR Module should be required to address via one of the defined paths: 1.Authentication, access control, and authorization 2.Auditable events and tamper resistance 3.Audit report(s) 4.Amendments 5.Automatic log-off 6.Emergency access 7.Encryption of data at rest 8.Integrity Note: As new privacy and security certification criteria are adopted, this minimal set will need to be revisited. For example, the “optional” Accounting of Disclosures criterion will need to be evaluated as a potential addition to this minimal set once the final rules are issued.

ONC Concerns re 2013 HITSC Proposal (Posnack , 3/26/14) Paths 1 and 3 = 2011 Edition; path 2 is new Path 1 creates risk of having multiple modules with incompatible security Paths 2 and 3 don’t require technical testing – 3 was inconsistently implemented by certifiers; sometimes easier to implement poor solution than to undertake back-and-forth with certifier – Need specific processes and characteristics of what would need to be submitted “70% of 2014 Edition EHR Modules were certified to at least one P&S criterion and more than 50% of EHR Modules have been certified to 4 or more P&S criteria” … “evidence on which to judge the policy change” [DBB: Is this meaningful?] 2 things are sure: – We don't know what scope of clinical capabilities an EHR Module presented for certification will have – We don't know the existing operating environment in which future certified EHR Modules will be dropped into Suggests working Paths 1, 2, and 3 through with the Implementation WG and getting implementer feedback in addition to considering the empirical data

NPRM Request for Consideration for 2017 Edition Includes HITSC recommendation and seeks comment on four options for certifying EHR Modules for privacy and security: – Option 1: Re-Adopt the 2011 Edition approach – Option 2: Maintain the 2014 Edition approach – Option 3: Adopt the HITSC recommendation -- Notes that this approach “reintroduces some of the challenges we sought to avoid with our current policy and introduces potentially new administrative burdens for EHR technology developers.” – Option 4: Adopt a limited applicability approach Establish a limited set of P&S functionality that every EHR Module would be required to address in order to be certified Notes that this approach has the same downsides as options 1 and 3, but to a lesser extent given that its broad applicability could still result in EPs, EHs, and CAHs adopting EHR Modules that had been certified with duplicative capabilities.

Baker Informal Assessment of Relevance After examining the relevance of each P&S criterion to the functional areas addressed by EHR certification criteria, concluded that all of the P&S criteria are not strictly necessary and/or appropriate for every functional area A subset of the P&S criteria could indeed be applied to "all" EHR Modules, without diminishing the importance of the other P&S criteria with respect to the risks they address For each functional area, a minimal set of relevant P&S criteria can be identified The best fit seems to be to: Propose a minimal set of P&S criteria for each functional area For each minimal set, allow three paths to certification

Baker Proposal 1.Certify all EHR Modules against the following criteria: authentication, access control, and authorization; auditable events/tamper-resistance; audit record(s); and integrity. 2.If the EHR Module is being certified against one or more clinical or care coordination criteria, also certify against these criteria: automatic log-off; emergency access; and end-user device encryption. 3.If the EHR Module is being certified against one or more clinical criteria, also certify against the amendments criterion. 4.If the EHR Module is being certified against one or more public health or utilization criteria, also certify against the end-user device encryption criterion. 5.Each required criterion could be met using one of the following three paths: a)Demonstrate, through system documentation and certification testing, that the EHR Module includes functionality that fully conforms to the criterion. b)Demonstrate, through system documentation sufficiently detailed to enable integration, that the EHR Module has implemented service interfaces that enable it to access external services necessary to conform to the criterion. c)Demonstrate through documentation that the privacy and security certification criterion is inapplicable or would be technically infeasible for the EHR Module to meet.

John Travis Response to Criteria Partitioning Proposed minimal set and partitioning of additional subsets is generally workable Exceptions noted: File management and reporting kinds of modules would have minimal needs for role- based access controls  (DBB) Criterion does not require role-based access control – “Establish the type of access to electronic health information a user is permitted based on the unique identifier(s) provided in paragraph (d)(1)(i) of this section, and the actions the user is permitted to perform with the EHR technology.” Security products could be modules themselves  (DBB) The 3 options for demonstrating compliance should cover all of these cases Certification of multiple modules that all use same security service is uselessly repetitive; suggests allowing vendor to attest to certification of common capability for modules that use that capability  (DBB) Agree – this is what 3b offers Re encryption of end-user devices for public health and utilization criteria, seems to presume that these systems store data on end-user devices; disagrees with this assumption (DBB: Need for PSWG input)

Steve Posnack #2 Assuming we were to implement the proposed policy, will the provider wind up with Product A, Product B, and their current system, each of which may include different P&S capabilities? What implementation impacts will the proposed approach impose on providers? Would like the PSWG to get input from Implementation Workgroup